DOI QR코드

DOI QR Code

모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment

  • 정윤수 (목원대학교 정보통신융합공학부) ;
  • 이상호 (충북대학교 소프트웨어학과)
  • Jeong, Yoon-Su (Dept. of Information Communication & Engineeringe, Baeseok University) ;
  • Lee, Sang-Ho (Dept. of Software, Chungbuk National University)
  • 투고 : 2015.03.18
  • 심사 : 2015.05.20
  • 발행 : 2015.05.28

초록

최근 이동통신망과 휴대단말기가 급격하게 발전하게 되면서 모바일 오피스 서비스가 점점 각광을 받고 있다. 그러나, 사용자가 모바일 오피스환경에서 업무를 수행할 때 원격에 있는 자료를 업/다운로드 할 경우 제3자로부터 악의적인 공격을 받을 수 있다. 본 논문에서는 모바일 오피스 환경에서 사용되는 개인정보 및 기업정보(통화내역, 수신메시지, 전화번호부, 일정, 위치정보, 금융거래정보, 서류 등)를 담고 있는 스마트폰의 도난 분실로 인한 정보유출 예방 기법을 제안한다. 제안 기법에서는 개인정보 및 기업 정보의 상태정보를 삼각퍼지수를 이용하여 쌍대비교 행렬로 구현한다. 특히, 제안 기법은 쌍대비교 행렬로 구한 값을 개인정보 및 기업 정보와 쌍으로 구성하여 스마트폰 분실시 제3자가 개인정보 및 기업 정보를 확인할 수 없도록 하여 외부로 유출하는 것을 예방한다.

Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

키워드

참고문헌

  1. K. Y. Lee, T. H. Park, J. I. Lin, "A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office", Journal of Korea Institute of Information Security & Cryptology, Vol. 21, No. 5, pp. 109-127, Oct. 2011.
  2. H. Tian, D. Liu, J. Lin, Y. Jin, "What Drives Mobile Office Service? A Revised Technology Acceptance Model Based on the Characteristics of Wireless Mobile Office Technology", 2010 International Conference of Information Science and Management Engineering, Vol. 1, pp. 166-170, Aug. 2011.
  3. G. Li, Y. Jiang, A. Hu, "Study on Application of TNC Technology in Mobile Office", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 799-803, Nov. 2010.
  4. Y. Zhiyu, Z. Linwei, L. Wenna, "Study on Security Strategy of Wireless Mobile Office System ", 2009. ETCS '09. First International Workshop on Education Technology and Computer Science, pp. 495-498, Mar. 2009.
  5. Y. Jiang, G. Li, A. Hu, "Mobile Office Security Technology for WLAN ", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 795-798, Nov. 2010.
  6. T. Wang, J. Zhang, L. Li, J. Jin, "Design and realization of the traffic police mobile office system based on Android ", 2011 19th International Conference on Geoinformatics, pp. 1-5, Jun. 2011.
  7. C. Martin, H. J. Bohme, H. -M. Gross, "Conception and realization of a multi-sensory interactive mobile office guide ", 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 6, pp. 5368-5373, Oct. 2004.
  8. Z. Ahmed, H. Jamal, R. Mehboob, S. Khan, M. Shahbaz, "Secure cognitive mobile hotspot ", IEEE Transactions on Consumer Electronics, Vol. 56, No.2, pp. 606-612, 2012. https://doi.org/10.1109/TCE.2010.5505977
  9. J. Anderson, D. W. Gerbing, "Structure Equation Modeling in Practive: A Review and Recommended Two-step Approach". Psychological Bulletin, vol. 103, No.3, pp. 411-423. 1998. https://doi.org/10.1037//0033-2909.103.3.411
  10. F. D. Davis, R. P. Bagozzi, P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical models", Management Science, Vol. 35, No. 8, pp.982-1003, 1989. https://doi.org/10.1287/mnsc.35.8.982
  11. D.K.W.Chiu, S.C.Cheung, E. Kafeza, and H.F.Leung. "A Three-Tier View Methodology for adapting M-services", IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 33, No. 6, pp. 725-741,2003.
  12. J Jing, A S Helal. "Client-server computing in Mobile Environments ", ACM Computing survey, Vol. 31, No. 2, pp.117-157, 1993.
  13. K.van Hee, N.Sidorova. T. "Inheritance of workflows: an approach to tackling problems related to change. Theoretical computer science", Vol. 270, No.1-2, pp.125-203, 2002. https://doi.org/10.1016/S0304-3975(00)00321-2
  14. K. Mathieson, E. Peacock, W. ChinW, "Extending the technology acceeptance model: the influence of perceived user resources", DATABASE, Vol. 32, No. 3, pp. 86-112, 2001.
  15. Yankee Group. "Mobile workers number almost 50 million", Business Communications Review,2005, Vol. 35, No. 8 pp. 8-12, 2005.